Release Date: June 20, 2025
CVE Vulnerability Identifier: CVE-2025-52837
Platform: Microsoft Windows
CVSSv3 Scores: 7.8: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity Rating: High
Summary
Trend Micro has released a fix for the Trend Micro Password Manager for Windows family of consumer products which resolves a Link Following Privilege Escalation Vulnerability.
Affected Version(s)
PRODUCT | AFFECTED VERSION(S) | PLATFORM | LANGUAGE(S) |
---|---|---|---|
Trend Micro Password Manager | 5.8.0.1327 and below | Microsoft Windows | English |
Solution
PRODUCT | UPDATED VERSION(S) | PLATFORM | LANGUAGE(S) |
---|---|---|---|
Trend Micro Password Manager | 5.8.0.1330 | Microsoft Windows | English |
Trend Micro has released an update via the product’s automatic update mechanism to resolve this issue. Your Trend Micro Password Manager program should receive the update automatically as long as your computer is connected to the Internet. Customers are advised to use the latest version when doing a fresh installation of the product.
Vulnerability Details
Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation.
Trend Micro has received no reports nor is aware of any actual attacks against the affected product related to this vulnerability at this time.
Acknowledgement
Trend Micro would like to thank the following individual for responsibly disclosing the issue and working with Trend Micro to help protect our customers:
- CrisprXiang With FDU working with Trend Micro Zero Day Initiative
Additional Assistance
Customers who have questions are encouraged to contact Trend Micro Support for further assistance.
External Reference
The following advisories may be found at Trend Micro's Zero Day Initiative Published Advisories site:
- ZDI-CAN-25729